S Shiva Ram π Master β 30.44K Points π Information Cyber Security Q. is used for encrypting data at network level (A) ipsec (B) https (C) smtp (D) s/mime ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) ipsec
V Vijay Sangwan π Mover β 28.62K Points π Information Cyber Security Q. SSL primarily focuses on Pretty good privacy (PGP) is used in (A) integrity and authenticity (B) integrity and non- repudiation (C) authenticity and privacy (D) confidentiality and integrity ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) integrity and authenticity
P Priyanka Tomar π Tutor III β 35.28K Points π Information Cyber Security Q. An attempt to make a computer resource unavailable to its intended users is called (A) denial-of-service attack (B) virus attack (C) worms attack (D) botnet process ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) denial-of-service attack
R Ram Sharma π Coach β 193.88K Points π Information Cyber Security Q. HTTPS is abbreviated as (A) secured hyper hypertexts transfer text transfer protocol secured protocol (B) none of the mentioned (C) hyperlinked text transfer protocol secured (D) hyper text transfer protocol secure ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) hyper text transfer protocol secure
G Gopal Sharma π Tutor III β 38.32K Points π Information Cyber Security Q. In tunnel mode, IPSec protects the (A) entire ip packet (B) ip header (C) ip payload (D) ip trailer ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) entire ip packet
V Vinay π Mover β 28.75K Points π Information Cyber Security Q. IPSec is designed to provide security at the (A) transport layer (B) network layer (C) application layer (D) session layer ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) network layer
A Admin π Coach β 38.23K Points π Information Cyber Security Q. RSA algorithm is best example of (A) asymmetric key cryptography (B) symmetric key cryptography (C) elliptic curve cryptography (D) all of the above ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) asymmetric key cryptography
A Admin π Coach β 38.23K Points π Information Cyber Security Q. Hash function is used for (A) message authentication (B) digital signature (C) both a and b (D) only a ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) both a and b
A Admin π Coach β 38.23K Points π Information Cyber Security Q. Diffie-Hellman algorithm is widely known as (A) key exchange algorithm (B) key agreement algorithm (C) only a (D) both a and b ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) both a and b
R Ram Sharma π Coach β 193.88K Points π Information Cyber Security Q. When a packet does not fulfil the ACL criteria, the packet is _________ (A) resend (B) dropped (C) destroyed (D) acknowledged as received ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) dropped